Remember the 8th layer of the OSI networking stack: humans. System administrators must educate themselves and their users about social engineering practices to prevent attacks.
- By Danielle Ruest and Nelson Ruest
- 05/27/2004
Network security is more important than ever. But network protection must move beyond the firewall. What new tools are on the horizon to help you with your combat strategy?
- By Danielle Ruest and Nelson Ruest
- 05/25/2004
InfoPath SP1 and the new .NET 2003 Toolkit let you implement business logic behind InfoPath forms with managed VB.NET or C# code instead of JScript or VBScript event handlers.
- By Roger Jennings
- 05/01/2004
You can boost performance in server-side apps by using COM+ pooled objects to cache resources. Be sure to enlist the connection manually each time the object pool picks up the object.
- By Enrico Sabbadin
- 05/01/2004
You can build a macro that recalculates and sets assembly dependencies upon request with the VS.NET automation model, even if your solution uses file references.
- By Enrico Sabbadin
- 05/01/2004
The C# Programming Language is a reference book that will benefit both beginners and veterans alike. Topics include exceptions, unsafe code, generics, anonymous methods, iterators, and partial types.
- By Mark Collins-Cope
- 05/01/2004
Activate Windows impersonation selectively, determine the update order of DataTables at run time, guarantee the delivery order of asynchronous delegates, and more.
- By Enrico Sabbadin
- 05/01/2004
How to prepare a small or medium business for disaster without overextending its already tight budget or overwhelming management with the details of an in-depth proposal.
- By Daniel Curry
- 05/01/2004
VB.NET offers an improved palette for creating Web-based software. Programming the Web with Visual Basic .NET is a complete reference book that gives you all the info you need.
- By Joel Semeniuk
- 04/26/2004
How to move the default directories created by IIS from the system drive. Plus, methods to make FTP more secure.
- By Danielle Ruest and Nelson Ruest
- 04/01/2004
Computer networks allow people to share resources, but computer security prevents access to resources. How to decide if you need PKI, and a step-by-step guide to installing PKI on your servers.
Create a shared database to provide interoperability between .NET and J2EE platforms, then extend it with a notification level between platforms.
Traffic-management switches are quickly becoming easier to deploy and support, with greater intelligence to repel more sophisticated application attacks
- By Hariharan Krishnan
- 04/01/2004
With the ease of deployment for .NET applications, WinForms are once again a viable solution for large deployment environments. If you're considering WinForm programming, Windows Forms Programming in Visual Basic .NET is a must-have.
Use FTP or HTTP POST to transfer files over the Internet with .NET. Also learn how to secure a database Connection string.
Users will notice how much faster your Web pages and sites run when you apply these seven ASP.NET tips to your coding.
You can adapt the logical perimeter network design to suit your own access requirements, but most common requirements are met with this design.
- By Danielle Ruest and Nelson Ruest
- 04/01/2004
Visual Basic .NET Power Coding offers concise discussion and helpful examples of VB.NET's most complex topics, such as delegates, threading, remoting, Reflection, and security.
Enhance your UIs' flexibility with dynamic coding that uses runtime conditions to determine menu behavior.
- By Kathleen Dollard
- 03/01/2004
Use Word's spell check from within your .NET application.
- By Fabio Ferracchiati
- 02/01/2004